Simulation #1: SSH Brute Force Attack
Sample Logs:
May 18 04:21:17 server sshd[1924]: Failed password for invalid user admin from 203.0.113.42 port 42412 ssh2 May 18 04:21:19 server sshd[1924]: Failed password for invalid user test from 203.0.113.42 port 42413 ssh2 May 18 04:21:21 server sshd[1924]: Failed password for invalid user root from 203.0.113.42 port 42414 ssh2 May 18 04:21:23 server sshd[1924]: Failed password for invalid user guest from 203.0.113.42 port 42415 ssh2 May 18 04:21:25 server sshd[1924]: Failed password for invalid user oracle from 203.0.113.42 port 42416 ssh2
Challenge:
Analyze the logs and extract the flag hidden in the pattern of failed attempts. Hint: count how many unique usernames were tried before blocking.
Hint:
- There are 5 attempts from the same IP.
- The flag format is
Flag{SSH_Brute_<number>}
.
Simulation #2: Phishing Email Analysis
Email with suspicious attachment and spoofed sender...
Simulation #3: DNS Exfiltration
Large volumes of DNS queries with suspicious patterns...